ReportWire

Tag: identity theft

  • How to protect yourself from identity fraud in Canada – MoneySense

    What we do know, however, is the type of fraud reported most often in Canada: identity fraud. To pull this off, criminals use phishing scams and other ruses to trick Canadians into revealing personal and financial information. Depending on what they find out, scammers could impersonate you, charge purchases to your credit card, apply for a loan and/or mortgage in your name, drain your bank accounts, and more.

    It’s also becoming harder to identify scams. Some fraudsters now use artificial intelligence (AI) technology to create highly convincing audio and video “deepfakes” using Canadians’ voices and faces. AI tools are also helping criminals target exponentially more people at once, making scams harder to avoid.

    How to protect your identity

    To help you protect yourself against ID theft and fraud, we created a series of how-to articles with practical tips on prevention and what to do if you think your identity may have been stolen.

    We’ve also launched a column dedicated to helping you protect specific things and people in your life. Check back monthly for new installments.

    Videos about fraud and scams

    How fraud and scams affect Canadians

    Learn more about the various types of scams targeting Canadians today, and what you can do to protect yourself and recover from ID fraud.

    Article Continues Below Advertisement


    sponsored

    Equifax Complete Protection

    Equifax Complete Protection is a credit and cybersecurity protection service designed to help Canadians spot the signs of identity fraud faster.

    • Provides daily credit monitoring and alerts
    • Scans for your personal data on the dark web
    • Social media monitoring by industry leader ZeroFox

    Subscription price: $34.95 per month

    Get free MoneySense financial tips, news & advice in your inbox.

    This article is presented by an advertising partner.

    This is an editorially driven article or content package, presented with financial support from an advertiser. The advertiser has no influence on the creation of the content.



    About MoneySense Editors


    About MoneySense Editors

    MoneySense editors and journalists work closely with leading personal finance experts in Canada. Since 1999, our award-winning magazine has helped Canadians navigate money matters.

    MoneySense Editors

    Source link

  • How to protect yourself from scams and identity theft

    Chris Krebs, former director of the Cybersecurity and Infrastructure Security Agency, joins “CBS Mornings” to discuss his new Masterclass and share ways people can protect themselves from online scams, identity theft and deepfakes.

    Source link

  • A shadowy L.A. crime ring is hijacking the IDs of foreign scholars, fraud expert says

    Using apartments in the San Fernando Valley and Glendale area, a shadowy group of identity thieves has been quietly exploiting a new kind of victim — foreign scholars who left the U.S. years ago but whose Social Security numbers still linger in American databases, according to a cybercrime expert.

    Criminals are resurrecting these dormant identities and submitting hundreds of applications for bank accounts and credit cards, says David Maimon, head of fraud insights at SentiLink and a criminology professor at Georgia State University. The Southern California-based fraudsters can then max out lines of credit while unknowing victims live halfway across the world, he says.

    Sgt. Frank Diana, with the L.A. County Sheriff’s Department Fraud and Cyber Crimes Bureau, said organized crime rings in the county are highly skilled at stealing identities, concealing their IP addresses and laundering their loot to make it hard to detect.

    Local identity crime rings “are doing it to make millions of dollars, live in nice houses, all at the expense of taxpayers,” Diana said. “It’s not their money, but they’re living like kings.”

    Maimon and his colleague Karl Lubenow said they uncovered this tactic of stealing foreign scholars’ IDs through their work at SentiLink, a company that works with financial institutions to verify identities and detect fraud.

    At first they were asked to examine applications where foreign movie stars and athletes were probably being impersonated.

    In the process, they said, their investigation unearthed something much larger: hundreds of applications submitted to major credit issuers from a set of similar California street addresses and IP addresses in September.

    As they sifted through the files, they saw that, in addition to targeting a handful of foreign celebrities, the fraudsters were impersonating scores of former foreign scholars who had come to the U.S. as long ago as 1977 and left as recently as 2024.

    These scholars were required to obtain Social Security numbers to work on campus in roles such as research or teaching assistants, postdoctoral fellows or visiting lecturers. They are no longer living in the U.S., but their personal information remains scattered across school databases and credit bureaus, which according to Maimon makes them prime prey for opportunistic hackers and fraudsters.

    Should victimized scholars seek to return to the U.S., they would encounter a massive pile of debt and a crippling credit score that could prevent them from gaining work or housing, Maimon said. Meanwhile, financial institutions are liable for the debt, which can ultimately increase the cost of their services to all customers, he added.

    Most of the applications that Maimon identified as fraudulent originated at apartments at six key addresses in Van Nuys, North Hollywood, Toluca Lake, Glendale and Thai Town. It’s likely that crime ring members use addresses they have access to so that they can pick up credit cards, checks and other sensitive documents sent in the mail, Maimon said.

    The nexus of these addresses falls in the Burbank and Glendale area, which Maimon points out is the home of Armenian Power, an organized crime group known for conducting sophisticated financial crimes.

    He also noted that scholars from Turkey, Armenia’s historical rival, accounted for about half of all fraudulent applications. The remainder were impersonating scholars from a variety of countries such as Japan, India, the Netherlands, Portugal and Greece.

    “They [Armenian Power] have been involved in identity theft and white-collar crime for the last 15 years or so,” Maimon said. “It leads us to believe that these guys are essentially stealing all these identities and using them in order to create all those bank accounts and credit lines.”

    Sgt. Diana said that the tactics used by the alleged identity theft ring that Maimon discovered align with those often used by Armenian crime groups, which tend to be based in the Burbank and Glendale areas.

    Although Diana does not know whether Armenian groups are behind fraud attempts targeting foreign scholars, he said these groups are responsible for a significant portion of organized financial crime in L.A. County.

    “We run into a lot of sophisticated Armenian crime groups that are experts on identity theft,” he said. “That’s what they do for a living and [they] make a lot of money.”

    The Sheriff’s Department is not currently investigating any identity theft cases involving foreign scholars, he said. A spokesperson for the Los Angeles Police Department said the department did not currently have any investigations related to this topic. The Burbank Police Department declined to comment.

    Maimon has not reported his findings to authorities, in part due to fear of retaliation from the criminals involved, he said. His previous efforts to shine a light on fraudsters led to his Social Security number and personal information being released on the dark web, resulting in years of identity theft attempts, he said.

    He has reported his findings to the affected financial institutions through his role as a fraud investigator.

    One of the financial institutions, which did not wish to be named due to security concerns, said in a statement that it first realized something was awry after seeing a series of suspicious high-dollar transactions in L.A. and Kern counties coming from accounts in the Glendale area. The majority of the account holders only had addresses dating back to 2023 and very limited credit history.

    The institution said it was continuing to receive fraudulent applications using the identities of former foreign scholars. Once applications are flagged, the institution asks for additional verification information, which it very rarely receives.

    Major data hacks have exposed millions of Americans’ personal information, which is now readily available for purchase on the dark web, Diana said.

    In 2024, the Federal Trade Commission received more than 1.1 million identity theft complaints and about 2.6 million complaints of related fraud resulting in total financial losses of more than $12.7 billion, according to a report by consumer credit reporting company Experian.

    Maimon said that artificial intelligence has increased the ease with which criminals can carry out identity theft.

    Once fraudsters have obtained a victim’s name, date of birth and Social Security number, they can easily use AI tools to generate a picture of a driver’s license or passport. They can even create a realistic-looking video of an AI person holding the photo ID and turning their head side to side, which is an additional security requirement at some institutions.

    Both the ID and the person are fake in this video, an example of how AI can be used to try to evade security measures at financial institutions.

    Identity fraud cases are also notoriously difficult to prosecute as criminals hide behind a web of shadowy IP addresses. In addition, there is typically a significant delay between when fraud is committed and when the victim finds out — often by receiving a letter from a collection agency months later, at which point the evidence trail may have gone cold, Diana said.

    “We’re often a day late and a dollar short,” Diana said.

    In the case of the foreign scholars’ stolen identities, the victims may never find out, providing even more protection for the Southern California perpetrators.

    Diana warns all Angelenos to remain vigilant for signs of identity theft by frequently checking their credit score.

    He recommends people lock their credit at the three major credit bureaus, Experian, Equifax and TransUnion. That way, if someone tries to open a fraudulent line of credit, the financial institution will be unable to access their credit report and probably will deny the application.

    Lastly, if anyone is a victim of identity theft, they should report it to a credit bureau, the FTC and local law enforcement, he said.

    Clara Harter

    Source link

  • Trump grants clemency to ex-Rep. George Santos | Long Island Business News

    Freed from the prison where he had been serving time for ripping off his campaign donors, former U.S. Rep. George Santos says he’s humbled by his experience behind bars but unconcerned about the “pearl clutching” of critics upset that President Donald Trump granted him clemency.

    “I’m pretty confident if President Trump had pardoned Jesus Christ off the cross, he would have had critics,” Santos said Sunday in an interview on CNN.

    Santos, who won office after inventing a bogus persona as a Wall Street dealmaker, pleaded guilty to fraud and identity theft last year and began serving a 7-year sentence in July at a prison in New Jersey. But Trump ordered him released him Friday after he’d served just 84 days. Trump called Santos a “rogue,” but said he didn’t deserve a harsh sentence and should get credit for voting Republican.

    Speaking on CNN’s “State of the Union,” Santos said he had “learned a great deal” and had “a very large slice of humble pie, if not the whole pie” while in prison.

    He also apologized to former constituents in his New York congressional district, saying he was “in a chaotic ball of flame” when he committed his crimes. Santos admitted last year to deceiving donors and stealing the identities of 11 people — including his own family members.

    But when asked about fellow Republicans unhappy that Trump freed him so soon, Santos said other presidential acts of clemency had been worse, citing President Joe Biden’s decision to pardon his son, Hunter, for gun and tax crimes.

    “So pardon me if I’m not paying too much attention to the pearl-clutching of the outrage of my critics,” Santos said.

    As part of his guilty plea, Santos had agreed to pay restitution of $373,750 and forfeiture of $205,003. But Trump’s clemency order appeared to clear him of paying any further fines or restitution.

    Santos said he has been granted a second chance and intended to “make amends,” but when asked if he intended to pay back the campaign donors he had defrauded, he said only if he had to.

    “If it’s required of me by the law, yes. If it’s not, then no,” Santos said.

    Santos had appealed to Trump directly for help, citing his loyalty to the president’s agenda and to the Republican Party in a letter published Oct. 13 in The South Shore Press. But he said Sunday that he had no expectations and learned of his commutation from fellow inmates who saw the news on television.

    Revelations that Santos invented much of his life story surfaced just weeks after he became the first openly gay Republican to elected to Congress in 2022.

    Santos had said while campaigning that he was a successful business consultant with a sizable real estate portfolio. But he ultimately admitted to embellishing his biography. He had never graduated from Baruch College, where he had claimed to be a standout player on the Manhattan college’s volleyball team. He had never worked at Citigroup and Goldman Sachs. He didn’t own property.

    In truth, he struggled financially, had drifted through several jobs, including one for a company accused of running a Ponzi scheme, and even faced eviction.

    After becoming just the sixth person to be expelled from Congress, Santos made hundreds of thousands of dollars selling personalized videos to the public on Cameo. He returned to the service Sunday.


    The Associated Press

    Source link

  • Santos says he’s humbled but dismisses ‘pearl clutching’ critics

    NEW YORK (AP) — Freed from the prison where he had been serving time for ripping off his campaign donors, former U.S. Rep. George Santos says he’s humbled by his experience behind bars but unconcerned about the “pearl clutching” of critics upset that President Donald Trump granted him clemency.

    “I’m pretty confident if President Trump had pardoned Jesus Christ off the cross, he would have had critics,” Santos said Sunday in an interview on CNN.


    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAm$2?E@D[ H9@ H@? @77:46 27E6C :?G6?E:?8 2 3@8FD A6CD@?2 2D 2 (2== $EC66E 562=>2<6C[ k2 9C67lQ9EEADi^^2A?6HD]4@>^2CE:4=6^86@C86D2?E@DA=624@FCE?6HJ@C<h_fc`5_eg75hc_h_c`h74_75fh36b_44QmA=62565 8F:=EJ E@ 7C2F5k^2m 2?5 :56?E:EJ E967E =2DE J62C 2?5 3682? D6CG:?8 2 fJ62C D6?E6?46 😕 yF=J 2E 2 AC:D@? 😕 }6H y6CD6J] qFE %CF>A @C56C65 9:> C6=62D65 9:> uC:52J 27E6C 96 D6CG65 ;FDE gc 52JD] %CF>A 42==65 $2?E@D 2 “C@8F6[” 3FE D2:5 96 5:5?’E 56D6CG6 2 92CD9 D6?E6?46 2?5 D9@F=5 86E 4C65:E 7@C G@E:?8 #6AF3=:42?]k^Am

    kAm$A62<:?8 @? r}}’D “$E2E6 @7 E96 &?:@?[” $2?E@D D2:5 96 925 “=62C?65 2 8C62E 562=” 2?5 925 “2 G6CJ =2C86 D=:46 @7 9F>3=6 A:6[ :7 ?@E E96 H9@=6 A:6” H9:=6 😕 AC:D@?]k^Am

    kAmw6 2=D@ 2A@=@8:K65 E@ 7@C>6C 4@?DE:EF6?ED 😕 9:D }6H *@C< 4@?8C6DD:@?2= 5:DEC:4E[ D2J:?8 96 H2D “:? 2 492@E:4 32== @7 7=2>6” H96? 96 4@>>:EE65 9:D 4C:>6D] $2?E@D 25>:EE65 =2DE J62C E@ 5646:G:?8 5@?@CD 2?5 DE62=:?8 E96 :56?E:E:6D @7 “ A6@A=6 — :?4=F5:?8 9:D @H? 72>:=J >6>36CD]k^Am

    kAmqFE H96? 2D<65 23@FE 76==@H #6AF3=:42?D F?92AAJ E92E %CF>A 7C665 9:> D@ D@@?[ $2?E@D D2:5 @E96C AC6D:56?E:2= 24ED @7 4=6>6?4J 925 366? H@CD6[ 4:E:?8 !C6D:56?E k2 9C67lQ9EEADi^^2A?6HD]4@>^2CE:4=6^3:56?D@?9F?E6C492C86DA2C5@?A=6586ac7b__f4a5a7cef72cg6a`334faeadadQmy@6 q:56?’D 564:D:@? E@ A2C5@? 9:D D@?k^2m[ wF?E6C[ 7@C 8F? 2?5 E2I 4C:>6D]k^Am

    kAm“$@ A2C5@? >6 :7 x’> ?@E A2J:?8 E@@ >F49 2EE6?E:@? E@ E96 A62C=4=FE49:?8 @7 E96 @FEC286 @7 >J 4C:E:4D[” $2?E@D D2:5]k^Am

    kAmpD A2CE @7 9:D 8F:=EJ A=62[ $2?E@D 925 28C665 E@ A2J C6DE:EFE:@? @7 Sbfb[fd_ 2?5 7@C76:EFC6 @7 Sa_d[__b] qFE %CF>A’D 4=6>6?4J @C56C 2AA62C65 E@ 4=62C 9:> @7 A2J:?8 2?J 7FCE96C 7:?6D @C C6DE:EFE:@?]k^Am

    kAm$2?E@D D2:5 96 92D 366? 8C2?E65 2 D64@?5 492?46 2?5 :?E6?565 E@ “>2<6 2>6?5D[” 3FE H96? 2D<65 :7 96 :?E6?565 E@ A2J 324< E96 42>A2:8? 5@?@CD 96 925 567C2F565[ 96 D2:5 @?=J :7 96 925 E@]k^Am

    kAm“x7 :E’D C6BF:C65 @7 >6 3J E96 =2H[ J6D] x7 :E’D ?@E[ E96? ?@[” $2?E@D D2:5]k^Am

    kAm$2?E@D 2AA62=65 E@ %CF>A 5:C64E=J 7@C 96=A[ 4:E:?8 9:D =@J2=EJ E@ E96 AC6D:56?E’D 286?52 2?5 E@ E96 #6AF3=:42? !2CEJ 😕 2 =6EE6C AF3=:D965 ~4E] `b 😕 k2 9C67lQ9EEADi^^D@FE9D9@C6AC6DD]4@>^DE@C:6D^efdfdegbdD2?E@D:?D@=:E2CJ2A2DD:@?2E6A=62E@AC6D:56?EECF>AQm%96 $@FE9 $9@C6 !C6DDk^2m] qFE 96 D2:5 $F?52J E92E 96 925 ?@ 6IA64E2E:@?D 2?5 =62C?65 @7 9:D 4@>>FE2E:@? 7C@> 76==@H :?>2E6D H9@ D2H E96 ?6HD @? E6=6G:D:@?]k^Am

    kAm#6G6=2E:@?D E92E $2?E@D :?G6?E65 >F49 @7 9:D =:76 DE@CJ DFC72465 ;FDE H666 E96 7:CDE @A6?=J 82J #6AF3=:42? E@ 6=64E65 E@ r@?8C6DD 😕 a_aa]k^Am

    kAm$2?E@D 925 D2:5 H9:=6 42>A2:8?:?8 E92E 96 H2D 2 DF446DD7F= 3FD:?6DD 4@?DF=E2?E H:E9 2 D:K23=6 C62= 6DE2E6 A@CE7@=:@] qFE 96 F=E:>2E6=J 25>:EE65 E@ 6>36==:D9:?8 9:D 3:@8C2A9J] w6 925 ?6G6C 8C25F2E65 7C@> q2CF49 r@==686[ H96C6 96 925 4=2:>65 E@ 36 2 DE2?5@FE A=2J6C @? E96 |2?92EE2? 4@==686’D G@==6J32== E62>] w6 925 ?6G6C H@C<65 2E r:E:8C@FA 2?5 v@=5>2? $249D] w6 5:5?’E @H? AC@A6CEJ]k^Am

    kAmx? ECFE9[ 96 DECF88=65 7:?2?4:2==J[ 925 5C:7E65 E9C@F89 D6G6C2= ;@3D[ :?4=F5:?8 @?6 7@C 2 4@>A2?J 244FD65 @7 CF??:?8 2 !@?K: D496>6[ 2?5 6G6? 72465 6G:4E:@?]k^Am

    kAmp7E6C 364@>:?8 ;FDE E96 D:IE9 A6CD@? E@ 36 6IA6==65 7C@> r@?8C6DD[ $2?E@D >256 9F?5C65D @7 E9@FD2?5D @7 5@==2CD D6==:?8 A6CD@?2=:K65 G:56@D E@ E96 AF3=:4 @? r2>6@] w6 C6EFC?65 E@ E96 D6CG:46 $F?52J]k^Am

    Copyright 2025 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed without permission.

    Source link

  • George Santos Says He’s Humbled but Dismisses ‘Pearl Clutching’ Critics

    NEW YORK (AP) — Freed from the prison where he had been serving time for ripping off his campaign donors, former U.S. Rep. George Santos says he’s humbled by his experience behind bars but unconcerned about the “pearl clutching” of critics upset that President Donald Trump granted him clemency.

    “I’m pretty confident if President Trump had pardoned Jesus Christ off the cross, he would have had critics,” Santos said Sunday in an interview on CNN.

    Santos, who won office after inventing a bogus persona as a Wall Street dealmaker, pleaded guilty to fraud and identity theft last year and began serving a 7-year sentence in July at a prison in New Jersey. But Trump ordered him released him Friday after he’d served just 84 days. Trump called Santos a “rogue,” but said he didn’t deserve a harsh sentence and should get credit for voting Republican.

    Speaking on CNN’s “State of the Union,” Santos said he had “learned a great deal” and had “a very large slice of humble pie, if not the whole pie” while in prison.

    He also apologized to former constituents in his New York congressional district, saying he was “in a chaotic ball of flame” when he committed his crimes. Santos admitted last year to deceiving donors and stealing the identities of 11 people — including his own family members.

    But when asked about fellow Republicans unhappy that Trump freed him so soon, Santos said other presidential acts of clemency had been worse, citing President Joe Biden’s decision to pardon his son, Hunter, for gun and tax crimes.

    “So pardon me if I’m not paying too much attention to the pearl-clutching of the outrage of my critics,” Santos said.

    As part of his guilty plea, Santos had agreed to pay restitution of $373,750 and forfeiture of $205,003. But Trump’s clemency order appeared to clear him of paying any further fines or restitution.

    Santos said he has been granted a second chance and intended to “make amends,” but when asked if he intended to pay back the campaign donors he had defrauded, he said only if he had to.

    “If it’s required of me by the law, yes. If it’s not, then no,” Santos said.

    Santos had appealed to Trump directly for help, citing his loyalty to the president’s agenda and to the Republican Party in a letter published Oct. 13 in The South Shore Press. But he said Sunday that he had no expectations and learned of his commutation from fellow inmates who saw the news on television.

    Revelations that Santos invented much of his life story surfaced just weeks after he became the first openly gay Republican to elected to Congress in 2022.

    Santos had said while campaigning that he was a successful business consultant with a sizable real estate portfolio. But he ultimately admitted to embellishing his biography. He had never graduated from Baruch College, where he had claimed to be a standout player on the Manhattan college’s volleyball team. He had never worked at Citigroup and Goldman Sachs. He didn’t own property.

    In truth, he struggling financially, had drifted through several jobs, including one for a company accused of running a Ponzi scheme, and even faced eviction.

    After becoming just the sixth person to be expelled from Congress, Santos made hundreds of thousands of dollars selling personalized videos to the public on Cameo. He returned to the service Sunday.

    Copyright 2025 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

    Photos You Should See – Oct. 2025

    Associated Press

    Source link

  • A look at South Florida links of ex-Rep. George Santos, whose sentence was commuted by Trump

    Former Republican Rep. George Santos of New York was convicted of 23 felony counts, prompting widespread scrutiny over the handling and consequences of political corruption cases.

    Former Republican Rep. George Santos of New York was convicted of 23 felony counts, prompting widespread scrutiny over the handling and consequences of political corruption cases.

    USA TODAY NETWORK file

    President Donald Trump commuted the sentence of former Rep. George Santos, who has Florida connections, on Friday afternoon.

    “I just signed a Commutation, releasing George Santos from prison, IMMEDIATELY,” Trump said on his Truth Social platform.

    Santos received a seven-year prison sentence after admitting to identity theft and wire fraud.

    He was also entangled in a fraudulent political-contribution scheme that involved multiple companies. One company was Harbor City Capital, a defunct investment firm that the Securities and Exchange Commission said ran a “classic Ponzi scheme.” At the time, Santos was the New York firm’s regional VP.

    Campaign-finance reports show Santos spent a great deal of time in South Florida from 2021 to 2022. During that period, Santos stayed at West Palm Beach hotels and attended events at Trump’s Mar-A-Lago resort in Palm Beach.

    At one point, Santos’ stay at the W South Beach — where a room usually costs $700 a night — was recorded as costing $199.99, one cent below the threshold requiring receipts be kept by a political campaign.

    The Campaign Legal Center, a nonprofit, flagged the stay in a complaint with the Federal Elections Commission. The FEC concluded that the difference in price was likely a result of an inappropriate documentation of campaign funds.

    But that wasn’t all for Santos. In 2022, he received campaign funding from Miami Beach residents Leila and David Centner. The Centners founded a Miami school, the Centner Academy, where teachers were recommended not to get vaccinated against COVID-19.

    After he was elected in 2022, many of his claims about his background were revealed to have been false. On Dec. 1, 2023, Santos was the sixth member in history to be expelled from the House of Representatives.

    Michael Butler

    Source link

  • Vehicle break-ins and identity theft in Thousand Oaks lead to arrest

    A 36-year-old Oxnard man is facing multiple felony charges in connection with a string of vehicle thefts and identity thefts in Thousand Oaks, following a months-long investigation by Ventura County authorities.

    According to a news release from the Ventura County Sheriff’s Office, detectives with the East County Investigations Bureau’s Property Crimes Unit began investigating in July after a series of thefts from unlocked vehicles were reported in Thousand Oaks.

    The suspects allegedly stole cash, credit cards, personal information, and other property, later using the stolen credit cards at businesses in Ventura County.

    Investigators identified a vehicle believed to be involved and eventually linked Fernando Salinas of Oxnard to the crimes. Salinas was arrested on Sept. 18 by the Los Angeles County Sheriff’s Department on unrelated residential burglary charges.

    High school student caught with loaded handgun in Santa Barbara County

    The following day, Ventura County detectives obtained an arrest warrant for Salinas related to the Thousand Oaks thefts. The Ventura County District Attorney’s Office has since filed charges of identity theft, grand theft, conspiracy to commit a crime, and petty theft with prior convictions, according to the sheriff’s office.

    Salinas remains in custody in Los Angeles County and will be extradited to Ventura County once he is released, officials said. Detectives are continuing to investigate and are working to identify additional suspects in the case.

    The sheriff’s office urged residents to remain vigilant by locking their vehicles and removing valuables, noting that while Thousand Oaks is considered a safe community, criminals can take advantage of a false sense of security.

    Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

    For the latest news, weather, sports, and streaming video, head to KTLA.

    Source link

  • How to protect your kids from online harm – MoneySense

    They may reach out, develop trust, and ask seemingly innocent questions like, “Oh, you have a dog? What’s your dog’s name?” Using artificial intelligence tools, they then use permutations of this information in attempts to hack the online accounts of other family members.

    “A child could be an effective channel for a criminal to gain that information,” warns Julie Kuzmic, senior compliance officer, consumer advocacy with credit bureau Equifax Canada.

    A range of harms

    As parents know only too well, children’s exposure to the internet comes with a range of benefits, but also lurking dangers. “There are potential harms to children as young as babies and toddlers all the way up to older teenagers—like 18, 19 years old,” Kuzmic says. Over that span they may be exposed to:

    • Developmental harms. Exposure to screens and to seeing people and hearing voices online affects brain growth from infancy and can crowd out other activities crucial to cognitive development, like unstructured play and human interaction.
    • Harmful content. Age-inappropriate content, misinformation, disinformation, and modified images can all negatively affect the child’s growth, learning, and judgment.
    • Nefarious contact and exploitation. Of particular concern for parents is the potential for online predators to contact and develop relationships with their children for their own pernicious purposes.
    • Privacy breaches and data collection. As in the example described above, criminals might obtain personal information to defraud or assume the identity of adult members of their household or the children themselves.
    • Mental and emotional illness. Excessive social media use in particular has been linked to anxiety, depression, body image issues, sleep deprivation, low physical activity, and stunted social development.

    Don’t assume kids know what they’re doing

    Though they often appear technology-savvy, at times serving as IT support for their befuddled parents, “kids don’t have the life experience to know that not everybody is who they say they are,” Kuzmic says. At other times, they may “have a low awareness of the permanence of what they do online. Things they post and share may be available and visible for the rest of time, effectively, so there can be an impact well on later into their lives.”

    They can be particularly vulnerable in their early teens as they begin to question their parents’ authority, push boundaries, and engage in higher-risk behaviour online. This coincides with the age when they might have their first bank and social media accounts and mobile phone.

    “In an age-appropriate way, it’s important to have an ongoing conversation with your children about guidelines and expectations,” Kuzmic says. “At any age, think of protection as a layered and evolving situation. It’s not something that you talk about once and then it’s fine.”

    Measures to protect kids from online harms

    Safeguarding your offspring online requires a hands-on approach. “Allowing exposure to online activity maybe should come with training wheels, where parents are a little more involved at the start and are learning together with the kids,” Kuzmic says. Some steps she recommends include:

    • Setting rules around internet access and the age at which children are allowed to access social media. Some families write it down as a contract that everybody can see and agree to.
    • Imposing physical limitations, such as no devices after bedtime.
    • Setting up digital limitations such as blocking platforms that screen out potentially undesirable content or a secure virtual private network (VPN).
    • Prioritizing online safety. Explain why your kids should be wary of people who approach them online. Advise them to avoid random links, banner ads, or quizzes designed to lure them into unsafe spaces.
    • Discouraging oversharing of personal information on social media.

    Though bad actors target minors for a variety of malevolent reasons, they all zero in on children’s relative weaknesses, such as a desire to be accepted and befriended. Parents need to be there, Kuzmic says, to remind their kids that what might not appear to them to be a dangerous situation “might actually be a dangerous situation.”

    Article Continues Below Advertisement


    Digital security from Equifax Complete Protection

    The hard part for parents—especially as their kids become older and increasingly independent—is they can’t be there all the time. For an additional level of online safety, consider Equifax CompleteTM Protection, a monthly subscription service that includes parental controls from Bitdefender to restrict which websites and apps your kids can access.

    Other features of Equifax Complete Protection include: 

    • Daily credit monitoring and alerts to notify you of key changes to your Equifax credit report, such as a new credit card or loan application. 
    • WebScan, which monitors the dark web (hidden websites where criminals buy and sell data) to see if your personal information appears there. 
    • Social media monitoring provided by industry leader ZeroFox, to alert you to suspicious activity on your social media accounts.
    • Online data encryption by NordVPN and online password generation and storage by NordPass 
    • Device protection from Bitdefender to help stop phishing attempts and protect devices from viruses and malware.

    Equifax Complete Protection costs $34.95 per month. To learn more, visit the Equifax website.

    Get free MoneySense financial tips, news & advice in your inbox.



    About Michael McCullough


    About Michael McCullough

    Michael is a financial writer and editor in Duncan, B.C. He’s a former managing editor of Canadian Business and editorial director of Canada Wide Media. He also writes for The Globe and Mail and BCBusiness.

    Michael McCullough

    Source link

  • 2 charged with stealing $2.8M from missing Long Island couple | Long Island Business News

    THE BLUEPRINT:

    • Two suspects charged with $2.8M fraud tied to missing Long Island couple

    • Victims last seen in March at their Old Brookville mansion

    • Investigation into couple’s disappearance remains ongoing

    • The defendants are scheduled to make their initial appearances in federal court in Central Islip on Thursday

    Two people were charged in federal court with allegedly stealing $2.8 million from a couple who have been reported missing, according to court documents unsealed in Central Islip on Monday. The couple was last seen in March at their mansion in Old Brookville.

    Yinye Wang, also known as “Roy Wang,” with a residence in Roslyn and College Point, and Qiuju Wu of Flushing, face bank fraud charges for allegedly stealing the money from the missing couple.

    Wang was arrested in California on Thursday and released on bond. Wu was arrested Thursday in Texas, and because she has no legal status in the United States, has been detained by the U.S. Immigration and Customs Enforcement, an official said.

    Attorney information for the defendants was not immediately available.

    Authorities say the scheme involved submitting fraudulent documents to “Bank-1,” a multinational financial institution with branches throughout the Eastern District of New York, including two in Flushing just blocks apart.

    The victims’ names are not specified in the documents, but align with the published reports regarding the disappearance of Peishuan Fan and JuanJuan Zwang. The victims were the sole signatories on their accounts, authorities said. But on June 29, Victim-1 was allegedly added to an account that Wu controlled, and the account was changed from an individual account to a joint account with rights of survivorship. Both Wu and Victim-1’s names, Social Security numbers and signatures appear on the new signature card, and the account address was updated to one associated with the victim, according to the complaint.

    That same day, the Wu account held just $1,919.26 – but within two days, more than $1.3 million was allegedly transferred into it from Victim-1’s account. Also on July 1, $190,000 was allegedly moved from Wu’s account to another in the name of a company allegedly incorporated by Wu, and shortly afterward, Wu allegedly withdrew $700,000. Surveillance footage from Branch-1 shows Wu allegedly conducting the transaction.

    In the ensuing days, more than $2 million was allegedly transferred out of the victims’ accounts. Surveillance footage from Branch-2 allegedly captured both Wang and Wu during the transaction.

    Investigators allege that Wang is also tied to other identity-theft schemes, including accounts associated with Branch-1.

    An investigation into the missing couple’s whereabouts is ongoing, according to published reports.

    Wang and Wu are scheduled to make their initial appearances in federal court in Central Islip on Thursday, at 1:30 p.m.

     


    Adina Genn

    Source link

  • Utah sheriff’s deputy stalked and killed by her father, prosecutors say

    Utah sheriff’s deputy stalked and killed by her father, prosecutors say

    TOOELE, Utah — Prosecutors charged a Utah man with murder Friday, alleging he killed his adult daughter, a Salt Lake City sheriff’s deputy.

    Hector Ramon Martinez-Ayala, 54, of Tooele, confessed in a text message to his brother of making “a big mistake” before fleeing the country and using his daughter’s bank card to withdraw money, prosecutors said in court documents.

    The victim was Marbella Martinez, 25, said Tooele Police spokesman Colbey Bentley.

    Martinez had started working as a corrections officer with the Salt Lake County Sheriff’s Office in January. The department had memorialized her in a Facebook post Thursday, noting her death was being investigated as “suspicious” by Tooele police.

    She had lived with her father in Tooele, west of Salt Lake City, until her father’s escalating series of obsessive texting, surveillance and stalking drove her to move into a hotel for a few days, according to court documents.

    The charges alleged her the stalking behavior had gone on for months, and that the “text messages from the defendant to the victim are more of the nature of a jealous lover than a father.” Martinez also found a bag of her underwear in his room, prosecutors said. Then, in mid-July he placed a tracking device on her vehicle while she was out of the country and later used it to find her and a romantic interest out by a hiking area, according to the charges.

    When she returned to their house on the morning of July 31, her father strangled her, investigators said. Cameras on the property were quickly disabled or disconnected, but Martinez-Ayala left plenty of digital footprints, including location data on his phone and his daughter’s phone, as well as a text message to his brother that afternoon, according to investigators.

    “My brother, you know much I love you, I made a big mistake, an unforgivable sin, now I’m too scared and I don’t know what to do. I think I will never come back,” the message said, according to the charging documents.

    He flew to California, then Texas, before his cell records ceased, prosecutors said. He was then filmed passing through customs in an undisclosed country where he used his brother’s identification.

    Martinez’s body was found on Aug. 1 in her bedroom after police were called to do a welfare check.

    In addition to murder, Martinez-Ayala is charged with felonies related to obstruction of justice, stealing a bank card, and stalking, as well as misdemeanor identity theft.

    Martinez-Ayala does not have an attorney listed in Utah online court records, and attempts to find alternative methods to contact him were unsuccessful.

    Source link

  • California woman sends Apple AirTag to herself to catch package thief

    California woman sends Apple AirTag to herself to catch package thief


    8/23: CBS Morning News

    20:50

    A Southern California woman fed up with her packages getting stolen out of her post office box sent an Apple AirTag to the address and cleverly tracked down the suspected thief, police said.

    The woman had had several items stolen from her mailbox at the Los Alamos Post Office already when she thought of the idea, the Santa Barbara County Sheriff’s Office said Tuesday. Apple’s $29 AirTags have become popular items since their 2021 release, helping users keep tabs on the location of anything from their lost keys to wallets and luggage.

    On Monday morning, sheriff’s deputies were called to the post office where the woman told officials her mail had been stolen again — including the package with the AirTag.


    Howard County Police hand out AirTags and SmartTags to track stolen Hyundais and Kias

    02:08

    Law enforcement tracked the AirTag to a block in Santa Maria, about 16 miles (26 kilometers) from the post office and arrested two suspects — a 27-year-old woman from Santa Maria and a 37-year-old man from Riverside.

    They located the package with the AirTag among the victim’s mail, as well as items believed to have been stolen from more than a dozen other people. The woman declined to be identified, the sheriff’s department said.

    The two suspects were booked in jail on charges of possession of checks with intent to commit fraud, conspiracy, and identity and credit card theft. The 37-year-old was also booked on a burglary charge and several other theft warrants from Riverside County.

    The sheriff’s department commended the mail theft victim for contacting law enforcement so they could apprehend the suspects rather than attempting to contact them on her own.

    Source link

  • Why parents may want to start locking a child’s credit at a very young age

    Why parents may want to start locking a child’s credit at a very young age

    Most parents would take herculean steps to protect their children. But many overlook a relatively simple way to help shore up a child’s financial security: freezing the minor’s credit. 

    This could be especially important in the wake of a major breach in which the Social Security numbers of myriad Americans might be for sale on the dark web. While locking their credit won’t solve all cybersecurity issues related to stolen Social Security numbers, it’s one extra layer of protection parents can implement.

    The credit-locking process involves contacting each of the three major credit bureaus — Experian, Equifax and TransUnion — and providing required documentation including the child’s birth certificate, Social Security card, proof of address and parent identification. The bureau then creates a credit report for the child and then locks it, so loans or credit cards can’t be issued using the child’s personal information. The freeze remains in place until the parent, or in some cases, the child, requests that it be lifted, temporarily or permanently.

    Parents can take these steps proactively even if there’s nothing to suggest a minor’s credit has been compromised such as unexpected credit card solicitations or bills received in the minor’s name.

    It can take some time and effort to lock a child’s credit, but the outlay is minimal compared with what can be a lengthy and emotional credit restoration process. “As an adult, if our credit is stolen, it makes us angry, but we do what needs to be done and we move forward,” said Kim Cole, community engagement manager at Navicore Solutions, nonprofit credit and housing counseling agency. But for children, the emotional impact is much greater, she said. “It can take years to get wind of a problem, and meanwhile the damage can continue to grow.”

    Identity theft against children — especially very young ones — often slips under the radar until they are older teens or young adults applying for their first credit card, trying to finance a car or seeking student loans, said Loretta Roney, president and chief executive of InCharge Debt Solutions, a nonprofit provider of credit counseling and other services.

    Yet, identity theft for children under age 19 is a growing issue, with this demographic accounting for 3% of all identity theft reports for the first half of 2024, according to Federal Trade Commission data. By comparison, this demographic accounted for 2% of identity fraud reports each year between 2021 and 2023. 

    Thieves might use a child’s Social Security number, name and address, or date of birth to do things like apply for government benefits, like health care coverage or nutrition assistance, open a bank or credit card account, apply for a loan, sign up for a utility service or rent a place to live, according to the FTC. Locking a child’s credit won’t protect against all of these, but it’s a solid step in the right direction, financial professionals said.

    It’s not just strangers committing fraud against children. Cole offers the example of a friend whose uncle had destroyed his credit and started using his niece’s name and Social Security number to open credit cards and max them out. He had the bills sent to his house, and the young woman only discovered the fraud about four years later, when she went to buy a small fixer-upper and realized she had nearly $50,000 of debt in her name and a credit score in the low 500s.  

    The niece filed a police report, a complaint with the FTC and disputed the items with the credit bureaus, but it took time to resolve. She applied for a secured credit card in the interim, since her score was too low to qualify for a traditional card, and the situation pushed back her home-buying by a few years, ultimately costing her more, Cole said.

    Check to see if the child has a credit report 

    Before locking a child’s credit, it’s good practice to check with each of the three major credit bureaus to see if a report exists. Generally, this will only be the case if someone has fraudulently taken out credit in the minor’s name, or if the child has been named an authorized user on an adult’s credit card. 

    To check to see if their child has a credit report, parents can mail a letter with their request to each of the credit bureaus. They should be sure to include a copy of the child’s birth certificate, Social Security card or document from the Social Security Administration showing this number and a copy of the parent’s driver’s license or government-issued identification, with current address. Legal guardians may have to give the credit bureaus a copy of documents authenticating their status.

    If something amiss pops up on the report, contact the companies where the fraud occurred as well as the three major credit bureaus. Also report the child identity theft to the FTC, including as many details as possible.

    If the report comes back clean, the next step is to actually lock the child’s credit.

    If needed, freeze a child’s credit

    The process for initiating a credit freeze varies slightly depending on the credit bureau and the age of the minor child. Be sure to follow the precise instructions for each credit bureau. For Equifax, in addition to required documentation, parents need to fill out a form online and submit it via postal mail; minors who are 16 or 17 may request their own security freeze by phone or by mail. The websites for Experian and TransUnion provide further details on their respective processes, which includes document requirements and mailing addresses. It can take a few weeks for the bureaus to process these requests. 

    Keep good records for unlocking later in life

    Parents need to keep safe the pin number they are provided when locking their child’s credit so it can be temporarily unlocked as needed, such as when the child turns 18 and wants to apply for a credit card, said Bruce McClary, senior vice president of membership and media relations at the nonprofit ​​​​​​​National Foundation for Credit Counseling.

    The unlocking process isn’t necessarily seamless and can take time. Equifax, for instance, asks for these requests in writing, with required documentation for identity verification purposes. After age 18, Equifax allows for managing the security freeze online.

    Educate children early on protection of personal information

    Parents should talk to their children about best practices with respect to sharing personal information, McClary said. For instance, they should caution children to be careful about the kinds of information they provide to websites and apps and to keep their Social Security number close to the vest.

    Parents may also want to consider credit or identity threat monitoring services or both. Certain providers may offer basic services for free, but family plans that include adults and children and offer a combination of credit and identity theft protection tend to be fee-based. These services — which can run around $24 or more per month — may offer more comprehensive protection, including identity theft insurance and fraud resolution services. Parents should weigh the options carefully to understand the choices and associated costs.

    Source link

  • California woman fed up with stolen mail sends Apple AirTag to herself to catch thief

    California woman fed up with stolen mail sends Apple AirTag to herself to catch thief

    SANTA BARBARA, Calif. — A Southern California woman fed up with her packages getting stolen out of her post office box sent an Apple AirTag to the address and cleverly tracked down the suspected thief, police said.

    The woman had had several items stolen from her mailbox at the Los Alamos Post Office already when she thought of the idea, the Santa Barbara County Sheriff’s Office said Tuesday. Apple’s $29 AirTags have become popular items since their 2021 release, helping users keep tabs on the location of anything from their lost keys to wallets and luggage.

    On Monday morning, sheriff’s deputies were called to the post office where the woman told officials her mail had been stolen again — including the package with the AirTag.

    Law enforcement tracked the AirTag to a block in Santa Maria, about 16 miles (26 kilometers) from the post office and arrested two suspects — a 27-year-old woman from Santa Maria and a 37-year-old man from Riverside.

    They located the package with the AirTag among the victim’s mail, as well as items believed to have been stolen from more than a dozen other people. The woman declined to be identified, the sheriff’s department said.

    The two suspects were booked in jail on charges of possession of checks with intent to commit fraud, conspiracy, and identity and credit card theft. The 37-year-old was also booked on a burglary charge and several other theft warrants from Riverside County.

    The sheriff’s department commended the mail theft victim for contacting law enforcement so they could apprehend the suspects rather than attempting to contact them on her own.

    Source link

  • One Tech Tip: Protecting yourself against SIM swapping

    One Tech Tip: Protecting yourself against SIM swapping

    NEW YORK — SIM-swapping is a growing form of identity theft that goes beyond hacking into an email or social media account. In this case, the thieves take over your phone number. Any calls or texts go to them, not to you.

    Any protections consumers enabled to secure access to their financial accounts, such as two-factor authentication texts, now can aid attackers and lock out owners.

    Experts say these scams will only increase and become more sophisticated, while the data show they are on the rise. The FBI Internet Crime Complaint Center reports that SIM-swapping complaints have increased more than 400% from 2018 to 2021, with associated personal losses estimated to be more than $68 million.

    Rachel Tobac, CEO of online security company SocialProof Security, says the numbers are probably a vast underestimate because most identity thefts are not reported.

    Criminals use personal information about their victims — phone numbers, addresses, birthdays and Social Security numbers — obtained through data breaches, leaks, dark web purchases or phishing scams to impersonate the victims as they contact their mobile carriers.

    They will claim the original phone and SIM card were damaged, lost or sold accidentally and ask for the number to be associated with a new SIM, or eSIM, card in their possession. Once this is done, the phone number belongs to the criminals, along with the ability to receive text messages or calls to verify accounts.

    Prevention is the best form of protection, according to cybersecurity experts. The tricks and habits security experts say help prevent SIM-swapping are what they have long been recommending for online security in general. They include the following:

    If your credentials are caught in a cyber breach, the hackers could try using the stolen passwords to get into other services to gather the personal data they need to pull off a SIM swap.

    If you’ve been using the same or similar login information for multiple websites or online accounts, make sure to change it. If criminals pilfer your password from one service, they can try it on your other accounts and easily get into all of them. If you find it too hard to memorize your various credentials, consider a password manager.

    Also use strong passwords that include letters, numbers and symbols. The longer they are, the better. Some experts say they should be 16 characters.

    Add biometrics or multifactor authentication apps and devices that do not involve texting. These methods often use separate login methods and encryption that are not tied to your phone’s identity, making them more difficult for criminals to access.

    AT&T also advises contacting your carrier to set up a unique passcode to prevent significant account changes such as porting phone numbers to another carrier. Your carrier may already have other protections in place to protect against SIM swapping, so it’s worth calling them to ask.

    Criminals will use email or text messages to try to trick you into giving them your personal and financial information or to expose your workplace to possible attacks, and it’s incredibly effective.

    In its annual State of the Phish report, the cybersecurity firm Proofpoint found a majority of data breaches across the world still center on human lapses.

    If you suspect you have received a possible phishing message or email, report it. Most of the popular email platforms have buttons or functions specifically for reporting phishing attempts. If you’re at work, follow the advice from your company’s information security team.

    All major U.S. carriers have web pages advising victims how to report a SIM fraud.

    But an Associated Press reporter, who recently was hit by such an attack, advises that victims should be diligent in working with the carrier to fix the issue. Filing complaints with the Federal Trade Commission, the Internet Crime Complaint Center or with their state attorneys general can possibly expedite recovery efforts.

    If card payment numbers were stolen, inform your bank or credit card company, explaining that your card is at risk of fraud and asking the company to alert you to any suspicious activity.

    You can also notify credit agencies, including the three main firms: Equifax, Experian and TransUnion. They can freeze your credit, which restricts access to your credit report and makes it hard to open new accounts or issue a fraud alert and will add a warning to your credit report encouraging lenders to contact you before lending money.

    Source link

  • Colorado public defender ransomware attack may have exposed Social Security numbers, personal data

    Colorado public defender ransomware attack may have exposed Social Security numbers, personal data

    The Office of the Colorado State Public Defender has acknowledged personal data may have been stolen during a ransomware attack that crippled the statewide agency in early February — but won’t say much else about the ongoing effort to restore its systems after the hack.

    Files “were copied without permission” during the cyberattack, which was discovered on Feb. 9, and those files may have included names, Social Security numbers, driver’s license numbers, medical information and health insurance information, the agency said in a statement Friday.

    Officials from the public defender’s office are still investigating whose personal data may have been stolen, and whether the personal data of attorneys or their clients was compromised, they said. A statement on the agency’s website urges “individuals” to remain vigilant against identity theft and fraud.

    It’s been more than a month since public defenders across the state were locked out of their computers and files in the ransomware attack and hundreds of court hearings were delayed over the next week because public defenders couldn’t do their jobs.

    Officials this week refused to answer questions from The Denver Post about what particular parts of the agency’s systems remain inoperable. In a ransomware attack, hackers use malware to hold an organization’s data hostage then demand a payment in cryptocurrency in order for organizations to regain access to that data.

    The public defender’s office also would not disclose the amount of ransom demanded or whether a ransom was paid. A statement on the agency’s website says the office has “made progress in returning to full operations.”

    Heavily redacted emails and text messages released to The Post by the Governor’s Office of Information Technology this week in response to an open records request mention the cyberattack recovery law firm Mullen Coughlin. Chief Deputy Public Defender Zak Brown would not confirm whether the public defender’s office is working with the firm.

    “We have provided all the information we are able to at this time,” he said in an email.

    A message left with the Pennsylvania-based law firm was not returned Wednesday.

    Shelly Bradbury

    Source link

  • LA woman steals millions in real estate assets in fraud scheme that involved disposing man’s body

    LA woman steals millions in real estate assets in fraud scheme that involved disposing man’s body

    LOS ANGELES (KABC) — A West Hills woman who authorities say acted “greedy and grotesque” was sentenced to 20 years in federal prison for a bizarre crime that involved identity theft, forgery, and disposing the body of a man and making it look like he was still alive.

    The video featured in the media player above is the ABC7 Los Angeles 24/7 streaming channel

    According to the Justice Department, Caroline Joanne Herrling, 44, was sentenced to 240 months in federal prison for fraudulently obtaining ownership of real estate and money through identity theft and forged power-of-attorney forms.

    Authorities said it was a nearly $3.9 million scheme.

    “This defendant’s misconduct was both greedy and grotesque, causing profound pain to the victims and their loved ones,” said U.S. Attorney Martin Estrada. “There must be serious consequences for those who prey on vulnerable communities, such as older adults, and my office will remain steadfast in bringing these offenders to justice.”

    Preying on vulnerable homeowners

    According to court documents, Herrling, who also went by Carrie Phenix, would look for properties in affluent neighborhoods that appeared “unkempt.”

    She and her co-conspirators would visit nicer neighborhoods to search for things like algae-filled pools or homes with overgrown shrubs to ultimately track down people “who were unable to care for their properties.”

    In 2020, they found a home in Sherman Oaks.

    “After finding such a home … Herrling and her co-conspirators broke into the residence, where an elderly victim resided,” said the Justice Department in a statement.

    Sometime in September 2020, that man, identified as Charles Wilding, died.

    Investigators aren’t sure how he died but believe Herrling and others “took over the property while his body decomposed in his home.”

    “Rather than reporting his death, Herrling and others in the conspiracy left his body in his house while they looted his assets,” said the Justice Department.

    Authorities said Herrling used a forged power-of-attorney form so she could pretend to act on Wilding’s behalf while stealing his real estate and financial accounts.

    Police begin missing person investigation

    In October 2021, law enforcement launched an investigation when neighbors reported Wilding missing.

    According to court documents, Herrling identified herself to police as a “close friend” of Wilding and his family. She was also listed as the trustee of his family trust, which, according to the DOJ, purportedly had been created by the victim’s mother, who died in June 2017.

    However, that was actually forged. She told police Wilding had moved to Carpinteria.

    “She stated that Wilding was not home and was staying with friends in the City of Carpinteria, while she was working to get the house back in order, as it was in disarray and contained black mold,” read the complaint obtained by ABC7.

    Herrling obtains new phone, paid man to pretend he was Wilding

    According to authorities, after Herrling found out about the police investigation into Wilding’s whereabouts, she “executed an elaborate scheme” to ensure his body would never be found and his death would remain unreported.

    According to the complaint, Herrling got a new phone and paid a man to use it so that he could pretend to be Wilding.

    “This to support the idea that the victim agreed to distribute his assets to Herrling and her co-conspirators,” said authorities.

    Body moved across California

    The DOJ said Herrling and her co-conspirators moved Wilding’s body to her apartment in West Los Angeles, where they tried to dissolve it in a “concoction of chemicals.”

    When that didn’t work, authorities said they dismembered the body, placed the pieces in vacuum-sealed bags and moved it all to the Bay Area.

    “Another member of the conspiracy who owned a sailboat assisted in disposing of the mutilated remains of the deceased victim into San Francisco Bay, the investigation revealed.” Investigators said Wilding’s remains were never found.

    During Friday’s sentencing hearing, U.S. District Judge Maame Ewusi-Mensah Frimpong said Wilding was “a man and a human being,” but Herrling “did not see that” and instead treated him “like a cash register.”

    More forged documents

    Wilding was the listed executor and beneficiary to the will of another victim, but that document was another forgery that Herrling claimed to have “discovered” in a safe deposit box rented by the deceased victim’s mother, court papers state.

    “Based on this forged will, the missing victim was to inherit an estate worth more than $1.7 million – assets that ultimately fell under Herrling’s control as the trustee for his estate,” said the Justice Department.

    Third victim had home sold without his consent

    Authorities said Herrling also defrauded a third victim and sold his home without his consent by “using a conspirator with fake identity documents” to pose as the victim.

    Herrling set up accounts to get the money from the sale, which was approximately $1.5 million.

    According to court documents, this third victim, who was already suffering from mental health issues, took his own life after losing his home. Herrling later used that money to buy a house in West Hills.

    The DOJ said the total loss amount in the cases was $3,887,051.

    Herrling pleads guilty

    Herrling pleaded guilty in March 2023 to one count of conspiracy to commit wire fraud. The 44-year-old has been in federal custody since January 2023.

    One of Herrling’s accomplices, identified as 50-year-old Matthew Jason Kroth of Tarzana, pleaded guilty in October 2023 to one count of conspiracy to commit wire fraud and one count of possession with intent to distribute methamphetamine.

    He faces up to 20 years in federal prison for wire fraud, and up to 40 years for meth trafficking when he’s sentenced in June.

    Copyright © 2024 KABC Television, LLC. All rights reserved.

    Tim Pulliam

    Source link

  • Rapper G Herbo could be sentenced to more than a year in jail in fraud plot

    Rapper G Herbo could be sentenced to more than a year in jail in fraud plot

    The rapper G Herbo could face just over a year in jail after pleading guilty to his role in a scheme that used stolen credit card information to pay for an opulent lifestyle including private jets and designer puppies.

    Under a deal with prosecutors reached last year, the 28-year-old Chicago rapper, whose real name is Herbert Wright III, entered a guilty plea in federal court in Springfield, Massachusetts, to conspiracy to commit wire fraud and making false statements. In exchange, prosecutors dismissed several counts of aggravated identity theft.

    G Herbo is set to be sentenced Thursday.

    Prosecutors, in their sentencing memo, argue that he should be jailed for a year and day and get 36 months of supervised release. They also want him to pay a $55,000 fine, enter a restitution order of nearly $140,000 and a forfeiture judgement of nearly $140,000.

    Those fines would be on top of the $140,000 he agreed to forfeit, the amount he benefited from what prosecutors have said was a $1.5 million scheme that involved several other people.

    Prosecutors argue the recommended sentence considers “the nature and circumstances of the offense and the history and characteristics of the defendant” and adequately reflects “the seriousness of the offense.”

    Defense attorneys are calling for probation, noting G Herbo has expressed regret for his crimes. They also highlighted his contributions to the community as well as the fact he has matured “as a human being, as a family man and as a father.”

    “Under the circumstances of this case, a sentence of probation will reflect the seriousness of the charge and protect the public,” according to G Herbo’s sentencing memo.

    From at least March 2017 until November 2018, G Herbo and his promoter, Antonio Strong, used text messages, social media messages and emails to share account information taken from dark websites, authorities said.

    On one occasion, the stolen account information was used to pay for a chartered jet to fly the rapper and members of his entourage from Chicago to Austin, Texas, authorities said. On another, a stolen account was used to pay nearly $15,000 for Wright and seven others to stay several days in a six-bedroom Jamaican villa.

    In court documents, prosecutors said G Herbo “used the proceeds of these frauds to travel to various concert venues and to advance his career by posting photographs and/or videos of himself on the private jets, in the exotic cars, and at the Jamaican villa.”

    G Herbo also helped Strong order two designer Yorkshire terrier puppies from a Michigan pet shop using a stolen credit card and a fake Washington state driver’s license, according to the indictment. The total cost was more than $10,000, prosecutors said.

    When the pet shop’s owner asked to confirm the purchase with G Herbo, Strong directed her to do so through an Instagram message, and G Herbo confirmed he was buying the puppies, authorities said.

    Because the stolen credit card information was authentic, the transactions went through and it wasn’t until later that the real credit card holders noticed and reported the fraud.

    G Herbo’s music is centered on his experiences growing up on the East Side of Chicago in a neighborhood dubbed Terror Town, including gang and gun violence.

    He released his debut mix tapes “Welcome to Fazoland” and “Pistol P Project” in 2014, both named for friends who had been killed in the city. His first album was 2017’s “Humble Beast,” and his latest is “Survivor’s Remorse,” released last year.

    His 2020 album “PTSD” debuted at No. 7 on the Billboard 200.

    G Herbo also started a program in Chicago called Swervin’ Through Stress, aimed at giving urban youths tools to navigate mental health crises, after publicly acknowledging his own struggle with post-traumatic stress disorder. In 2021 he was named to Forbes’ 30 Under 30 music list.

    Source link

  • Schools improve protection against online attacks, but many vulnerable to ransomware

    Schools improve protection against online attacks, but many vulnerable to ransomware

    WASHINGTON — Some K-12 public schools are racing to improve protection against the threat of online attacks, but lax cybersecurity means thousands of others are vulnerable to ransomware gangs that can steal confidential data and disrupt operations.

    Since a White House conference in August on ransomware threats, dozens of school districts have signed up for free cybersecurity services, and federal officials have hosted exercises with schools to help them learn how to better secure their networks, said Anne Neuberger, the Biden’s administration’s deputy national security advisor for cyber and emerging technology.

    Neuberger said more districts need to take advantage of programs available that would better guard against online attackers who are increasingly targeting schools. Their aim is to lock up computer systems, and in some cases, steal and publish sensitive personal information if a ransom is not paid.

    “Compromises happens again and again, often in the same way, and there are defenses to protect against it. And here the government has really brought companies together, brought agencies together to deploy some of those,” Neuberger said in an interview. “Don’t give up. Reach out and sign up. And your kids will be a lot safer online.”

    The administration announced steps over the summer to help cash-strapped schools, which have been slow to build up cybersecurity defenses. Ransomware attackers, many of whom are based in Russia, have not only forced schools to temporarily close but have exposed a wealth of students’ private information.

    Last month, parents sued the Clark County School District in Nevada, alleging a ransomware attack led to the release of highly sensitive information about teachers, students and their families in the country’s fifth largest school district. In another high-profile case this year, hackers broke into the Minneapolis Public Schools system and dumped sexual assault case records and other sensitive files online after the district refused to pay a $1 million ransom.

    More than 9,000 small public school districts across the United States with up to 2,500 students — that’s roughly 70 percent of public districts in the country — are now eligible for free cybersecurity services from web security company Cloudflare through a new program called Project Cybersafe Schools, Neuberger said. Since August, roughly 140 districts in 32 states have signed up for the program, which provides free email security and other online threat protection, she said.

    James Hatz, technology coordinator for Rush City Public Schools in Minnesota, said the program arrived just in time for their district, quickly stopping 100 suspicious emails from getting to staff. Hatz said cybercriminals often try to get teachers to click on malicious links by pretending to be an administrator sharing documents about things such as pay raises.

    “We are not going to be bulletproof, but the more we can do to make it harder, the better between user training, this program and everything else,” Hatz said.

    Neuberger also said a $20 million grant program from Amazon Web Services that is designed to help schools improve their cybersecurity has received about 130 applications.

    The Federal Communications Commission has also proposed a pilot program that would make up to $200 million available over three years to strengthen cyber defense in schools and libraries. Neuberger said the hope is that money will be available to schools in the “near future.”

    But Doug Levin, director of the K12 Security Information eXchange, a Virginia-based nonprofit that helps schools defend against cybersecurity risk, said he fears attacks against schools are going to continue to grow both in frequency and severity without more federal support and requirements that schools have baseline cybersecurity controls.

    “Most have underfunded their IT functions. They do not have cybersecurity experts on staff. And they’re increasingly being viewed as as a soft target by cyber criminals,” Levin said. “So, ultimately I think the federal government is going to need to do more.”

    Source link

  • Hawaii couple who gained attention for posing in KGB uniforms convicted of stealing identities of dead babies

    Hawaii couple who gained attention for posing in KGB uniforms convicted of stealing identities of dead babies

    A jury has convicted a Hawaii couple of conspiracy, passport fraud and identity theft for stealing identities and living for decades under the names of dead babies. The couple initially made headlines after prosecutors found photos of them wearing KGB uniforms and alleged they said things “consistent with espionage.”

    Jurors deliberated for about two hours before reaching guilty verdicts Monday, according to court records.

    Stolen Identities Couple Charged
    This combination of undated photos provided by the United States District Court District of Hawaii shows Walter Glenn Primose, left, also known as Bobby Edward Fort, and his wife Gwynn Darle Morrison, aka Julie Lyn Montague.

    / AP


    The judge presiding over the trial in U.S. District Court in Honolulu referred to the couple by their preferred names of Bobby Fort and Julie Montague. The couple had argued in court that their actions did not harm anyone.

    At the start of the trial, Assistant U.S. Attorney Tom Muehleck said the real Bobby Fort has been dead for more than 50 years. The baby had “a bad cough” and lived 3 months, Muehleck said.

    One of the witnesses who testified was Tonda Montague Ferguson, who said she was in the eighth grade when her mother gave birth to her sister, Julie Montague, in 1968. But the infant had birth defects and died about three weeks later, Ferguson said.

    The two babies were buried in Texas cemeteries 15 miles (24 kilometers) apart, Muehleck said.

    Prosecutors said the couple’s real names are Walter Glenn Primrose and Gwynn Darle Morrison.

    They had attended the same Texas high school and a classmate who had been in touch with them afterward remembered they stayed with him for a while and said they planned to change their identities because of substantial debt, Muehleck said.

    The husband even used his fake identity, which made him 12 years younger, to join the Coast Guard, the prosecutor said.

    When they’re sentenced in March, they face maximum 10-year prison terms for charges of making false statements in the application and use of a passport. They face up to five years for conspiracy charges and mandatory two-year consecutive terms for aggravated identity theft.

    According to a criminal complaint obtained by Hawaii News Now, Primrose was allegedly issued a total of five U.S. passports under the identity of Bobby Fort. Morrison was issued a total of three U.S. passports under the name of Julie Montague, the complaint says.  

    The case gained attention soon after their arrests last year because prosecutors suggested it was about more than just identity theft. Early on, prosecutors introduced Polaroids of the couple wearing jackets that appear to be authentic KGB uniforms. Investigators also found an invisible ink kit, documents with coded language and maps showing military bases.

    Stolen Identities Couple Charged
    This combination of undated photos provided by the United States District Court District of Hawaii shows Walter Glenn Primose, left, also known as Bobby Edward Fort, and his wife Gwynn Darle Morrison, also known as Julie Lyn Montague, purportedly in KGB uniforms. 

    / AP


    Lawyers for the couple said they wore the same jacket once for fun and prosecutors later backed away from any Russian spy intrigue.

    “She is not a spy,” Morrison’s attorney Megan Kau told Hawaii News Now last year.

    Source link